US20120246078A1 - Method for making secure transactions - Google Patents

Method for making secure transactions Download PDF

Info

Publication number
US20120246078A1
US20120246078A1 US13/425,409 US201213425409A US2012246078A1 US 20120246078 A1 US20120246078 A1 US 20120246078A1 US 201213425409 A US201213425409 A US 201213425409A US 2012246078 A1 US2012246078 A1 US 2012246078A1
Authority
US
United States
Prior art keywords
transaction
transactions
character
identification number
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/425,409
Inventor
Sami Atig
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/425,409 priority Critical patent/US20120246078A1/en
Publication of US20120246078A1 publication Critical patent/US20120246078A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data

Definitions

  • the invention concerns a method for securing transactions performed with cards provided with an owner identification number and protected by a secret code for certain operations.
  • biometrics fingerprints, the iris of the eye, voice, etc.
  • secret code number is still the easiest to apply and is therefore the one that has been chosen for “consumer” transactions.
  • the object of the invention is to eliminate these drawbacks by means of a method that ensures the secrecy of at least one character of the card number and/or at least one character of the secret code by modifying these characters with each transaction.
  • the card number and/or the secret code comprise(s), in predetermined positions, at least one character that is modified with each transaction;
  • the modifiable character(s) of the card number and/or the secret code are modified as a function of the same character(s) of the predetermined parameter(s). It is possible to modify only one number of the card and/or only one number of the secret code.
  • This parameter can be furnished by an event, such as the amount of a previous transaction, a transaction date or another date, the identifier of the merchant with which the transaction was performed, or any other event that is random in nature, chosen with the institution handling the transaction.
  • an event such as the amount of a previous transaction, a transaction date or another date, the identifier of the merchant with which the transaction was performed, or any other event that is random in nature, chosen with the institution handling the transaction.
  • said parameter is the amount or the date of a previous transaction, it can be for example the next-to-last transaction.
  • the character(s) of the card number and/or the secret code can be modified by means of a function that acts on the chosen parameter.
  • a second secret code is used for telecommunications transactions, all the characters of which are changed with each transaction as a function of one or more predetermined parameter(s).
  • the figure schematically represents the positions of the characters of a card number and a secret code in an exemplary embodiment of the invention in which a single character of the number and the code is replaced by the same character of a single previous transaction.
  • the characters of the card number and the secret code are represented by an A, except for one of them, the variable character, which is represented by an N.
  • the amount of the previous transaction (the event chosen) is represented by Xs, except for one of the characters, which is also represented by an N.
  • a previous transaction for example the next-to-last one, involved the sum of 356£.
  • the user of the card inserts his card into the machine recording the transaction.
  • the machine reads the number of the card, except for the next-to-last number, and asks that the latter be re-entered.
  • the user will then type in 3.
  • the machine then requests the secret code, which is typed in by the user.
  • the transaction can then be performed.
  • variable character to be replaced by this digit increased by an agreed-upon figure, for example 1.
  • variable character will be replaced by a 4 instead of a 3.
  • the latter can be executed in all of the automated machines using the card and in any secure network.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Credit Cards Or The Like (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention concerns a method for carrying out a transaction comprising prior steps of identifying the card by reading its number and authenticating the bearer optionally by writing in the secret code using a keyboard. The invention is characterised in that the secret code and/or the card number, comprise(s) in a specific position at least a character modified at each transaction. The modified character(s) (n) of the secret code and/or the card is/are modified in accordance with at least a character of a predetermined parameter.

Description

  • The invention concerns a method for securing transactions performed with cards provided with an owner identification number and protected by a secret code for certain operations.
  • Banking or commercial transactions performed with cards, wherein the identification of the user is ensured by a card number and possibly confirmed by a secret code, are commonly used today. These cards can have a chip and/or a magnetic strip or other data storage means. They can even be virtual.
  • Protection by secret code normally ensures the identification of the user who, theoretically, is the only one who knows this code. But there are transactions in which a secret code cannot be used, particularly in telephone or minitel commerce.
  • There are several other possible protection methods, including biometrics (fingerprints, the iris of the eye, voice, etc.) but the secret code number is still the easiest to apply and is therefore the one that has been chosen for “consumer” transactions.
  • Unfortunately, it is still possible for a third party to learn the number of the card, for example during the transaction, when this number has to be communicated, and the secret code can still be detected during its entry, particularly at automated teller machines on the street. As a result, if the card is stolen, it is possible to use it and to perform transactions as long as the theft is not recorded in banks' computers.
  • The object of the invention is to eliminate these drawbacks by means of a method that ensures the secrecy of at least one character of the card number and/or at least one character of the secret code by modifying these characters with each transaction.
  • This object is achieved according to the invention in that the card number and/or the secret code comprise(s), in predetermined positions, at least one character that is modified with each transaction;
      • the modified character(s) of the card and/or the secret code is/are each modified as a function of at least one character of at least one predetermined parameter.
  • According to another particular embodiment of the invention, the modifiable character(s) of the card number and/or the secret code are modified as a function of the same character(s) of the predetermined parameter(s). It is possible to modify only one number of the card and/or only one number of the secret code.
  • This parameter can be furnished by an event, such as the amount of a previous transaction, a transaction date or another date, the identifier of the merchant with which the transaction was performed, or any other event that is random in nature, chosen with the institution handling the transaction.
  • In the case where said parameter is the amount or the date of a previous transaction, it can be for example the next-to-last transaction.
  • In order to secure the transaction more effectively, the character(s) of the card number and/or the secret code can be modified by means of a function that acts on the chosen parameter.
  • In order for the method to be applicable, the user of the card agrees with the institution handling the latter on the following points;
      • The previous parameter(s) to be used;
      • The rank of the digit(s) of the parameter derived from the previous event(s) to be used;
      • The number of characters of the card number to be varied;
      • The rank of the character(s) of the card number to be varied;
      • The number of characters of the code that may possibly be varied;
      • The rank of the character(s) of the secret code that may possibly be varied.
  • Preferably, in the case where a previous transaction is used as the event that furnishes the parameter, it is the next-to-last transaction.
  • In essence, it is easy for a third party present during transactions to learn the amounts of them, particularly in the case of a withdrawal from an automated teller machine. It is more difficult to learn the amount of the transaction performed the time before.
  • According to a particular characteristic of the invention, a second secret code is used for telecommunications transactions, all the characters of which are changed with each transaction as a function of one or more predetermined parameter(s).
  • In essence, it is necessary, in the context of these transactions, to protect oneself against an interception of the transmission of the code. To do this, one uses this second code. The second code is changed after each transaction, even if the latter has not been validated by the institution handling the cards.
  • The figure schematically represents the positions of the characters of a card number and a secret code in an exemplary embodiment of the invention in which a single character of the number and the code is replaced by the same character of a single previous transaction.
  • The characters of the card number and the secret code are represented by an A, except for one of them, the variable character, which is represented by an N. The amount of the previous transaction (the event chosen) is represented by Xs, except for one of the characters, which is also represented by an N.
  • A previous transaction, for example the next-to-last one, involved the sum of 356£.
  • By arrangement with the institution handling the card, it is the hundreds digit of this transaction that should be used to replace the variable character of the card and that of the code. Also by arrangement, it is for example the next-to-last character that should be replaced.
  • The transaction proceeds as follows:
  • The user of the card inserts his card into the machine recording the transaction. The machine reads the number of the card, except for the next-to-last number, and asks that the latter be re-entered. The user will then type in 3.
  • The number of the card is therefore now
  • AAAAA . . . A3A.
  • The machine then requests the secret code, which is typed in by the user.
  • AA3A.
  • The transaction can then be performed.
  • As a result of the method according to the invention, the holder of the card as well as the institution handling this card are assured that in case of theft, the fraudulent use of the card will be, if not impossible, at least extremely difficult, since the user has to know not only the secret code but, in the case where a previous transaction has been chosen:
      • the amount of the previous transaction;
      • the digit or digits of this transaction to be used;
      • the chronological order of this transaction (last, next-to-last, etc.);
      • the rank of the character or characters of the code to be replaced.
  • In order to facilitate the memorization of these digits by a user who makes only withdrawals and small purchases in stores, it is preferable that only one digit be used, as in the example described above, and that it be the same for the card number and for the secret code, when one is used.
  • In the case according to the preceding example, where the key digit of the next-to-last transaction is the same as that of the last one, it is possible to provide according to the invention for the variable character to be replaced by this digit increased by an agreed-upon figure, for example 1.
  • Thus, in our example, if the last transaction has the same hundreds digit as the next-to-last one, the variable character will be replaced by a 4 instead of a 3.
  • It is also possible to provide, according to the invention, for the replacement character(s) to be obtained by means of a function that acts on the chosen characters of the previous events, in order to further secure the operation and facilitate memorization.
  • Furthermore, in order to facilitate the generation of new numbers and/or codes for the user by means of the function, the latter can be executed in all of the automated machines using the card and in any secure network.

Claims (16)

1-12. (canceled)
13. A method for performing secure transactions involving an account provided with an owner identification number, said transactions including the steps of identifying said account via a telecommunications transaction for communication of said identification number, said transactions being the type in which the identification number of said account comprises, in positions predetermined by arrangement with the institution handling the transactions, at least one character that is modifiable with each of a sequence of transactions, and modifying said character as a function of at least one character of at least one predetermined parameter, and being characterized in that said predetermined parameter is an element of at least one event that is random in nature, chosen by agreement with said institution for securing said transaction.
14. A method as defined in claim 13 including a further step of selecting a previous transaction as said event that is random in nature for facilitating memorization of said owner.
15. A method as defined in claim 13 including a further step of selecting an identifier of a merchant involved in said transaction as said event that is random in nature for further securing said transaction.
16. A method according to claim 13 characterized in that said function acts on a parameter that depends on the location, the merchant, or the terminal at which said transaction is performed.
17. A method according to claim 13 characterized in that said function acts on at least two parameters, each depending on a different event.
18. A method for performing secure transactions involving an account provided with an identification number and a secret code, said transactions including the steps of identifying said account via a telecommunications transaction for communication of said identification number and said secret code, said transactions being the type in which the identification number of said account comprises, in positions predetermined by arrangement with the institution handling the transactions, at least one character that is modifiable with each of said transactions, and modifying said character as a function of at least one character of at least one predetermined parameter, and being characterized in that said predetermined parameter is an element of at least one event that is random in nature, chosen by agreement with said institution for securing said transaction.
19. A method according to claim 18 including the step of using a second secret code for telecommunication transactions the characters of which are changeable with each transaction as a function of one or more of said predetermined parameters.
20. A method for performing secure transactions involving an account provided with an owner identification number, said transactions including the steps of identifying said account via a telecommunications transaction for communication of said identification number, wherein the institution handling said transactions introduces new characters differing from the characters of said identification number for facilitating a secure transaction,
21. A method according to claim 20 wherein said new characters are random in nature.
22. A method according to claim 20 wherein said new characters are correlated with the date of said transaction.
23. A method according to claim 20 wherein said new characters are correlated with the amount of said transaction.
24. A method according to claim 20 wherein said new characters are correlated with the date and the amount of said transaction.
25. A method according to claim 21 wherein said new characters are correlated with the date of said transaction.
26. A method according to claim 21 wherein said new characters are correlated with the amount of said transaction.
27. A method according to claim 21 wherein said new characters are correlated with the date and the amount of said transaction.
US13/425,409 2000-06-09 2012-03-20 Method for making secure transactions Abandoned US20120246078A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/425,409 US20120246078A1 (en) 2000-06-09 2012-03-20 Method for making secure transactions

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
FR00/07393 2000-06-09
FR0007393A FR2810179B1 (en) 2000-06-09 2000-06-09 METHOD FOR MAKING TRANSACTIONS USING SECRET CODE CARDS SECRET
US10/297,722 US8140433B2 (en) 2000-06-09 2001-06-08 Method for making secure transactions carried out with cards provided with an owner identification number
US13/425,409 US20120246078A1 (en) 2000-06-09 2012-03-20 Method for making secure transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/297,722 Continuation US8140433B2 (en) 2000-06-09 2001-06-08 Method for making secure transactions carried out with cards provided with an owner identification number

Publications (1)

Publication Number Publication Date
US20120246078A1 true US20120246078A1 (en) 2012-09-27

Family

ID=8851130

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/297,722 Expired - Fee Related US8140433B2 (en) 2000-06-09 2001-06-08 Method for making secure transactions carried out with cards provided with an owner identification number
US13/425,409 Abandoned US20120246078A1 (en) 2000-06-09 2012-03-20 Method for making secure transactions

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/297,722 Expired - Fee Related US8140433B2 (en) 2000-06-09 2001-06-08 Method for making secure transactions carried out with cards provided with an owner identification number

Country Status (8)

Country Link
US (2) US8140433B2 (en)
EP (1) EP1295264B1 (en)
AT (1) ATE321322T1 (en)
AU (1) AU2001266130A1 (en)
CA (1) CA2416816A1 (en)
DE (1) DE60110789D1 (en)
FR (1) FR2810179B1 (en)
WO (1) WO2001095272A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6636833B1 (en) * 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
CA2366517C (en) * 1999-04-13 2006-11-07 Orbis Patents Limited Person-to-person, person-to-business, business-to-person, and business-to-business financial transaction system
US10592901B2 (en) * 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers
DE102011085538A1 (en) * 2011-11-01 2013-05-02 Bundesdruckerei Gmbh Document, Method for authenticating a user, in particular for activating a chip card function, and computer system
FR3090934A1 (en) * 2018-12-21 2020-06-26 Orange Method and system for securing operations, and associated user station

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4924514A (en) * 1988-08-26 1990-05-08 International Business Machines Corporation Personal identification number processing using control vectors
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5627355A (en) * 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US5239583A (en) * 1991-04-10 1993-08-24 Parrillo Larry A Method and apparatus for improved security using access codes
US5163097A (en) * 1991-08-07 1992-11-10 Dynamicserve, Ltd. Method and apparatus for providing secure access to a limited access system
JP2821306B2 (en) * 1992-03-06 1998-11-05 三菱電機株式会社 Authentication method and system between IC card and terminal
WO1993023830A1 (en) * 1992-05-08 1993-11-25 Wesco Software Limited Authenticating the identity of an authorised person
GB9321357D0 (en) * 1993-10-15 1993-12-22 British Telecomm Personal identification systems
FR2788154A1 (en) * 1998-12-01 2000-07-07 Philippe Baron D Secure data exchange for electronic or internet payments
DE19924232C2 (en) * 1999-05-27 2003-07-24 Giesecke & Devrient Gmbh Method and device for storing and retrieving PIN codes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4924514A (en) * 1988-08-26 1990-05-08 International Business Machines Corporation Personal identification number processing using control vectors
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5627355A (en) * 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers

Also Published As

Publication number Publication date
EP1295264B1 (en) 2006-03-22
ATE321322T1 (en) 2006-04-15
DE60110789D1 (en) 2007-09-20
AU2001266130A1 (en) 2001-12-17
US8140433B2 (en) 2012-03-20
FR2810179B1 (en) 2005-02-18
FR2810179A1 (en) 2001-12-14
EP1295264A1 (en) 2003-03-26
CA2416816A1 (en) 2001-12-13
WO2001095272A1 (en) 2001-12-13
US20040068469A1 (en) 2004-04-08

Similar Documents

Publication Publication Date Title
US6016963A (en) Integrated circuit card with means for performing risk management
US5988497A (en) Method for authenticating credit transactions to prevent fraudulent charges
US5365046A (en) Preventing unauthorized use of a credit card
DE69912749T2 (en) SYSTEM AND METHOD FOR LOCKING AND UNLOCKING A CHIP CARD APPLICATION
US20080257953A1 (en) System and method for the transferring an electronic sum of money from a credit memory
KR100436460B1 (en) Secure data transmission from unsecured input environments
US20020152177A1 (en) Method and arrangement for electronically transferring an amount of money from a credit account memory
US20120246078A1 (en) Method for making secure transactions
CN101894423A (en) Bank client transaction system
WO1997024831A1 (en) Multiple cryptographic key distribution
JPH1145366A (en) Individual confirmation system
EP1274028A1 (en) System and method of electronic transaction
US20100332349A1 (en) Systems and methods for fund transfers using prepaid calling cards and telephones
JP6270005B1 (en) Magnetic recording card and information verification system
KR100790349B1 (en) Secret number protection method for automatic teller machine
KR20000024353A (en) Method and process for unifying the use of multiple subscriber cards or identification tools
CN108171510A (en) Offline payment method, apparatus and system to network payment account universal retrieval
CA2381074A1 (en) Secure system for conducting electronic transactions and method for use thereof
JP2006235694A (en) Password code authentication system
US20030041270A1 (en) Intelligent identifying method
CN115206034A (en) Bank card data processing method and device, terminal equipment and storage medium
KR20040084380A (en) System and method for financial transaction using the mobile device
JPS60134967A (en) Finance terminal system
AU2888800A (en) A method operable during a first operation authorized by a first card to perform at least one second operation
WO2002041207A1 (en) Security system for electronic commerce

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION